An arbitrary code execution vulnerability exists in the rendering functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242. When drawing the contents of a page using colors from an indexed colorspace, the application can miscalculate the size of a buffer when allocating space for its colors. When using this allocated buffer, the application can write outside its bounds and cause memory corruption which can lead to code execution. A specially crafted document must be loaded by a victim in order to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070 - Exploit, Third Party Advisory |
Information
Published : 2020-09-17 13:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6116
Mitre link : CVE-2020-6116
CVE.ORG link : CVE-2020-6116
JSON object : View
Products Affected
gonitro
- nitro_pro